HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.124 Selection of suitable database software

S 2.124 Selection of suitable database software

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: IT Security Management, Administrators

During the procurement of a new database software, it should be selected so as to achieve the highest possible degree of security with a minimum of personnel and organisational resources during future operation.

To start with, the area of application and the purpose of the database system needs to be ascertained in order to formulate requirements concerning availability, integrity and confidentiality. Furthermore, the requirements regarding processed data volumes, processing rate and throughput need to be quantified. This will shape the features required of the database software, such as portability to particular hardware platforms and operating systems, or the scope of necessary security mechanisms. At this stage of planning, it is already possible to determine whether and to what extent hardware will need to be extended and upgraded for future operation of the database system. The required monitoring functions must also be defined on the basis of the availability requirements, i.e. it must be decided which various database states should be identified and in which form (e.g. by means of a log file) as well as the method of notifying responsible persons or groups of persons about critical states of the database (for example, through the output of messages to the console).

Particular note must be made of the following items when procuring database software:

Examples:

These criteria must be used as a basis for testing and evaluating the available database systems. The software finally selected should fulfil the specified requirements to the greatest possible extent. Any remaining requirements should be covered using externally or internally developed add-ons. Before procurement, clarification is required as to which external add-ons are available for which database software, in order to avoid costly internal development.

Most commercial database management systems are available in different versions. Versions of the same database management system can differ in terms of their functionality, also as regards data security. Due to intense competition between manufacturers, some of the software programs supplied by them are not yet fully developed, and are thus potentially restricted in their functionality and reliability.

In view of this, a test phase should be implemented in order to check whether the selected database software actually performs the required functions in the stipulated operating environment. This applies particularly to performance specifications and contingency planning mechanisms.

Experience gathered from comparable installations should also be taken into consideration before procurement of the database software.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home